Static task
static1
Behavioral task
behavioral1
Sample
4cbebdc4f9c2297196d758598f8adc8d7635c72a60643245c21d47b70ec66758.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4cbebdc4f9c2297196d758598f8adc8d7635c72a60643245c21d47b70ec66758.exe
Resource
win10v2004-20220812-en
General
-
Target
4cbebdc4f9c2297196d758598f8adc8d7635c72a60643245c21d47b70ec66758
-
Size
55KB
-
MD5
02dd41fa44e1ddb0e76e16e599a838b6
-
SHA1
76df0e9e5a117a8571ffae3d3432a0d8aade5a2d
-
SHA256
4cbebdc4f9c2297196d758598f8adc8d7635c72a60643245c21d47b70ec66758
-
SHA512
238e5c61d820e056dd8676539ca9d032e48c27118733efe1ad97d9b5587d4b605257b962371670f05a67ba7933a1ad4e4256a4f1e8f5537d7288719aa6940c11
-
SSDEEP
1536:gw8+f3WDFdKyKdxk6Q5+4WNYXqEHlqNUTuD4wmp:RHPWDDKZxr4W8FqNUyD4
Malware Config
Signatures
Files
-
4cbebdc4f9c2297196d758598f8adc8d7635c72a60643245c21d47b70ec66758.exe windows x86
4259e7dbfeac92097b2bbbc90e5f5d75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
Pie
DeleteObject
SetWinMetaFileBits
msvcrt
_read
free
strcmp
memcpy
__set_app_type
_stricmp
_wsopen
_dup
_itow
_itoa
version
GetFileVersionInfoA
kernel32
SetFileAttributesW
TlsAlloc
SizeofResource
HeapDestroy
SetUnhandledExceptionFilter
VirtualAlloc
GetSystemTime
SystemTimeToFileTime
GetConsoleCP
GetSystemInfo
LoadLibraryExW
HeapReAlloc
ExitProcess
CreateMutexA
advapi32
RegOpenKeyExW
GetUserNameA
AllocateAndInitializeSid
RegQueryInfoKeyA
QueryServiceConfigA
ControlService
RegQueryValueW
RegCreateKeyExA
SetServiceStatus
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 22KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 19KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE